General

  • Target

    JaffaCakes118_47c9d4bbb10a138cb8d126735b976f22

  • Size

    2.3MB

  • Sample

    250101-fgtkdsxpgl

  • MD5

    47c9d4bbb10a138cb8d126735b976f22

  • SHA1

    0ce89089004bb315f0f6934311d4a98678042e84

  • SHA256

    d3c967ebe05bcd11c84a933670ecdc748a621ab5b3892c45c883c0d55ba556f3

  • SHA512

    aef2f3af76887ebf736b21d43032e0edb59aaa40be608142abee9c165f2fb1ad47c66b8477f064293bd13080231a2309079a590d194fbac79a27994fff94b851

  • SSDEEP

    49152:8XJROhQi7Sn42IvWHSSwmBI7uAtN1po9xvCLJk03FczZ:850dW42ITWK7z/1C9L03F8

Malware Config

Targets

    • Target

      JaffaCakes118_47c9d4bbb10a138cb8d126735b976f22

    • Size

      2.3MB

    • MD5

      47c9d4bbb10a138cb8d126735b976f22

    • SHA1

      0ce89089004bb315f0f6934311d4a98678042e84

    • SHA256

      d3c967ebe05bcd11c84a933670ecdc748a621ab5b3892c45c883c0d55ba556f3

    • SHA512

      aef2f3af76887ebf736b21d43032e0edb59aaa40be608142abee9c165f2fb1ad47c66b8477f064293bd13080231a2309079a590d194fbac79a27994fff94b851

    • SSDEEP

      49152:8XJROhQi7Sn42IvWHSSwmBI7uAtN1po9xvCLJk03FczZ:850dW42ITWK7z/1C9L03F8

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks